-
3
-
-
0001619596
-
Flexible support for multiple access control policies
-
DOI 10.1145/383891.383894
-
S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, "Flexible Support for Multiple Access Control Policies," ACM Trans. Database Systems, vol. 26, no. 2, pp. 214-260, June 2001. (Pubitemid 33661632)
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
4
-
-
84856535358
-
Users, groups, and the superuser
-
third ed., O'Reilly Media, Inc., Feb.
-
S. Garfinkel, G. Spafford, and A. Schwartz, "Users, Groups, and the Superuser," Practical Unix and Internet Security, third ed., O'Reilly Media, Inc., Feb. 2003.
-
(2003)
Practical Unix and Internet Security
-
-
Garfinkel, S.1
Spafford, G.2
Schwartz, A.3
-
5
-
-
35348884906
-
A large-scale study of web password habits
-
DOI 10.1145/1242572.1242661, 16th International World Wide Web Conference, WWW2007
-
D. Florncio and C. Herley, "A Large-Scale Study of Web Password Habits," Proc. 16th Int'l Conf. World Wide Web, pp. 657-666, 2007. (Pubitemid 47582295)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 657-666
-
-
Florencio, D.1
Herley, C.2
-
7
-
-
85094843538
-
Digsig: Run-time authentication of binaries at kernel level
-
A. Apvrille, D. Gordon, S. Hallyn, M. Pourzandi, and V. Roy, "Digsig: Run-Time Authentication of Binaries at Kernel Level," LISA '04: Proc. 18th Systems Administration Conf., pp. 59-66, 2004.
-
(2004)
LISA '04: Proc. 18th Systems Administration Conf.
, pp. 59-66
-
-
Apvrille, A.1
Gordon, D.2
Hallyn, S.3
Pourzandi, M.4
Roy, V.5
-
8
-
-
4444332056
-
-
Technical Report CS-TR-4259, Univ. of Maryland
-
L. van Doorn, G. Ballintign, and W.A. Arbaugh, "Signed Executables for Linux," Technical Report CS-TR-4259, Univ. of Maryland, 2002.
-
(2002)
Signed Executables for Linux
-
-
Van Doorn, L.1
Ballintign, G.2
Arbaugh, W.A.3
-
11
-
-
84856525128
-
-
Web Site (viewed 28 Aug. 2009)
-
"Google Android," Web Site (viewed 28 Aug. 2009), http://code.google.com/android/, 2011.
-
(2011)
Google Android
-
-
-
12
-
-
34548708575
-
Lurking in the shadows: Identifying systemic threats to kernel data (short paper)
-
DOI 10.1109/SP.2007.25, 4223229, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
A. Baliga, P. Kamat, and L. Iftode, "Lurking in the Shadows: Identifying Systemic Threats to Kernel Data," Proc. IEEE Symp. Security and Privacy, pp. 246-251, May 2007. (Pubitemid 47432531)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 246-251
-
-
Baliga, A.1
Kamat, P.2
Iftode, L.3
-
13
-
-
85084162914
-
Copilot-A coprocessor-based kernel runtime integrity monitor
-
Aug.
-
N.L. Petroni Jr., T. Fraser, J. Molina, and W.A. Arbaugh, "Copilot-A Coprocessor-Based Kernel Runtime Integrity Monitor," Proc. 13th USENIX Security Symp., pp. 179-194, Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symp.
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
14
-
-
27544461178
-
Detecting stealth software with Strider GhostBuster
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
Y.-M. Wang, D. Beck, B. Vo, R. Roussev, and C. Verbowski, "Detecting Stealth Software with Strider Ghostbuster," Proc. Int'l Conf. Dependable Systems and Networks, pp. 368-377, June 2005. (Pubitemid 41538251)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 368-377
-
-
Wang, Y.-M.1
Beck, D.2
Vo, B.3
Roussev, R.4
Verbowski, C.5
-
15
-
-
21644451617
-
Detecting kernel-level rootkits through binary analysis
-
Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
-
C. Kruegel, W. Robertson, and G. Vigna, "Detecting Kernel-Level Rootkits through Binary Analysis," Proc. 20th Ann. Computer Security Applications Conf., pp. 91-100, 2004. (Pubitemid 40931067)
-
(2004)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 91-100
-
-
Kruegel, C.1
Robertson, W.2
Vigna, G.3
-
17
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
Aug.
-
N.L. Petroni Jr., T. Fraser, A. Walters, and W. Arbaugh, "An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data," Proc. 15th USENIX Security Symp., pp. 289-304, Aug. 2006.
-
(2006)
Proc. 15th USENIX Security Symp.
, pp. 289-304
-
-
Petroni Jr., N.L.1
Fraser, T.2
Walters, A.3
Arbaugh, W.4
-
18
-
-
34748886842
-
-
Technical Report DCS-TR-593, Dept. of Computer Science, Rutgers Univ., Jan.
-
A. Baliga, X. Chen, and L. Iftode, "Paladin: Automated Detection and Containment of Rootkit Attacks," Technical Report DCS-TR-593, Dept. of Computer Science, Rutgers Univ., Jan. 2006.
-
(2006)
Paladin: Automated Detection and Containment of Rootkit Attacks
-
-
Baliga, A.1
Chen, X.2
Iftode, L.3
-
19
-
-
84988573115
-
The design and implementation of tripwire: A file system integrity checker
-
G.H. Kim and E.H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker," Proc. ACM Conf. Computer and Comm. Security, pp. 18-29, 1994.
-
(1994)
Proc. ACM Conf. Computer and Comm. Security
, pp. 18-29
-
-
Kim, G.H.1
Spafford, E.H.2
-
22
-
-
84856535361
-
-
web page, Nov.
-
"WriteFileEx Function," web page, http://msdn.microsoft.com/en- us/library/aa365748 (VS.85).aspx, Nov. 2008.
-
(2008)
WriteFileEx Function
-
-
-
23
-
-
84856535362
-
-
Digital Signatures for Kernel Modules on Systems Running Windows Vista, Microsoft, July
-
Digital Signatures for Kernel Modules on Systems Running Windows Vista, Microsoft, http://www.microsoft.com/whdc/winlogo/drvsign/kmsigning.mspx, July 2007.
-
(2007)
-
-
-
24
-
-
55549097262
-
Subverting vista kernel for fun and profit
-
Aug.
-
J. Rutkowska, "Subverting Vista Kernel for Fun and Profit," Blackhat Presentation, http://blackhat.com/presentations/bh-usa-06/BH-US-06- Rutkowska.pdf, Aug. 2006.
-
(2006)
Blackhat Presentation
-
-
Rutkowska, J.1
-
25
-
-
23244459906
-
Trusted paths for browsers
-
DOI 10.1145/1065545.1065546
-
Z. Ye, S. Smith, and D. Anthony, "Trusted Paths for Browsers," ACM Trans. Information and System Security, vol. 8, no. 2, pp. 153-186, May 2005. (Pubitemid 41092670)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 153-186
-
-
Ye, Z.1
Smith, S.2
Anthony, D.3
-
26
-
-
70349270845
-
Rootkit-resistant disks
-
Oct.
-
K.R.B. Butler, S. McLaughlin, and P.D. McDaniel, "Rootkit-Resistant Disks," Proc. 15th ACM Conf. Computer and Comm. Security, pp. 403-415, Oct. 2008.
-
(2008)
Proc. 15th ACM Conf. Computer and Comm. Security
, pp. 403-415
-
-
Butler, K.R.B.1
McLaughlin, S.2
McDaniel, P.D.3
-
27
-
-
84856556461
-
-
web site (viewed 22 Jan. 2009)
-
"Bsign," web site (viewed 22 Jan. 2009), http://packages. debian. org/lenny/bsign, 2011.
-
(2011)
Bsign
-
-
-
28
-
-
84856535360
-
-
Patchset from Linux Kernel Mailing List (LKML: 14 Feb. 2007), Feb.
-
D. Howells, "Modsign: Kernel Module Signing," Patchset from Linux Kernel Mailing List (LKML: 14 Feb. 2007), http://lkml.org/lkml/2007/2/14/ 164, Feb. 2007.
-
(2007)
Modsign: Kernel Module Signing
-
-
Howells, D.1
-
30
-
-
80955137032
-
Make/dev/kmem a config option
-
Apr.
-
A. van de Ven, "make/dev/kmem a Config Option," GIT Commit, http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6-stable.git;a= commit;h=b781ecb6a379f155568ef7093e 38c6c1d857fe53, Apr. 2008.
-
(2008)
GIT Commit
-
-
Van De Ven, A.1
-
31
-
-
84856556463
-
X86: Introduce/dev/mem restrictions with a config option
-
Apr.
-
A. van de Ven, "x86: Introduce/dev/mem Restrictions with a Config Option," GIT Commit, http://git.kernel.org/?p=linux/kernel/git/stable/ linux-2.6-st a b l e . g it;a=commit;h= ae531c26c5c2a28ca1b35a75b39b3b256850f2c8, Apr. 2008.
-
(2008)
GIT Commit
-
-
Van De Ven, A.1
-
32
-
-
32344445800
-
Signed kernel modules
-
Jan.
-
G. Kroah-Hartman, "Signed Kernel Modules," Linux J., vol. 117, pp. 48-53, Jan. 2004.
-
(2004)
Linux J.
, vol.117
, pp. 48-53
-
-
Kroah-Hartman, G.1
-
33
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
Aug.
-
C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman, "Linux Security Modules: General Security Support for the Linux Kernel," Proc. 11th USENIX Security Symp., pp. 17-31, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security Symp.
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Morris, J.3
Smalley, S.4
Kroah-Hartman, G.5
-
34
-
-
0003508562
-
-
Federal Information Processing Standards Publication 186, technical report, US Dept. of Commerce/NIST, Nat'l Technical Information Service, Virginia
-
"'Digital Signature Standard," Federal Information Processing Standards Publication 186, technical report, US Dept. of Commerce/NIST, Nat'l Technical Information Service, Virginia, 1994.
-
(1994)
Digital Signature Standard
-
-
-
36
-
-
70349278544
-
A look in the mirror: Attacks on package managers
-
Oct.
-
J. Cappos, J. Samuel, S. Baker, and J.H. Hartman, "A Look in the Mirror: Attacks on Package Managers," Proc. 15th ACM Conf. Computer and Comm. Security, pp. 565-574, Oct. 2008.
-
(2008)
Proc. 15th ACM Conf. Computer and Comm. Security
, pp. 565-574
-
-
Cappos, J.1
Samuel, J.2
Baker, S.3
Hartman, J.H.4
-
37
-
-
77950577461
-
Playing with ptrace, part 1
-
Nov.
-
P. Padala, "Playing with ptrace, Part 1," Linux J., vol. 103, Nov. 2002.
-
(2002)
Linux J.
, vol.103
-
-
Padala, P.1
-
38
-
-
84856548204
-
-
web page, Dec.
-
Y.K. Okuji, "GNU GRUB," web page, http://www.gnu.org/software/ grub/, Dec. 2008.
-
(2008)
GNU GRUB
-
-
Okuji, Y.K.1
-
39
-
-
84856522864
-
-
Google, developer website, July
-
Google, "Android Developer Guide,"developer website, http://developer.android.com/guide/publishing/app-signing.html, July 2009.
-
(2009)
Android Developer Guide
-
-
-
40
-
-
84856548205
-
Digital signatures
-
second ed., O'Reilly Media, Inc., May
-
S. Oaks, "Digital Signatures," Java Security, second ed., O'Reilly Media, Inc., May 2001.
-
(2001)
Java Security
-
-
Oaks, S.1
-
41
-
-
25844482575
-
-
second ed. VDM Publishing House Ltd., Jan.
-
R. Russell, D. Quinlan, and C. Yeoh, Filesystem Hierarchy Standard, second ed. VDM Publishing House Ltd., http://www.pathname. com/fhs/, Jan. 2004.
-
(2004)
Filesystem Hierarchy Standard
-
-
Russell, R.1
Quinlan, D.2
Yeoh, C.3
-
43
-
-
84856556464
-
-
web page (accessed 15 Dec. 2008)
-
"Knoppix Linux," web page (accessed 15 Dec. 2008), http://www.knoppix.net, 2011.
-
(2011)
Knoppix Linux
-
-
-
44
-
-
33947098438
-
Towards protecting sensitive files in a compromised system
-
DOI 10.1109/SISW.2005.17, 1628479, Proceedings - Third IEEE International Security in Storage Workshop, SISW 2005
-
X. Zhao, K. Borders, and A. Prakash, "Towards Protecting Sensitive Files in a Compromised System," Proc. IEEE Third Int'l Security in Storage Workshop, pp. 21-28, 2005. (Pubitemid 46402457)
-
(2005)
Proceedings - Third IEEE International Security in Storage Workshop, SISW 2005
, vol.2005
, pp. 21-28
-
-
Xin, Z.1
Borders, K.2
Prakash, A.3
-
45
-
-
84978374045
-
Self-securing storage: Protecting data in compromised systems
-
Oct.
-
J. Strunk, G. Goodson, M. Scheinholtz, C. Soules, and G. Ganger, "Self-Securing Storage: Protecting Data in Compromised Systems," Proc. Fourth Symp. Operating Systems Design and Implementation, Oct. 2000.
-
(2000)
Proc. Fourth Symp. Operating Systems Design and Implementation
-
-
Strunk, J.1
Goodson, G.2
Scheinholtz, M.3
Soules, C.4
Ganger, G.5
-
47
-
-
85077741011
-
Storage-based intrusion detection: Watching storage activity for suspicious behavior
-
Aug.
-
A. Pennington, J. Strunk, J. Griffin, C. Soules, G. Goodson, and G. Ganger, "Storage-Based Intrusion Detection: Watching Storage Activity for Suspicious Behavior," Proc. 12th USENIX Security Symp., pp. 137-151, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
, pp. 137-151
-
-
Pennington, A.1
Strunk, J.2
Griffin, J.3
Soules, C.4
Goodson, G.5
Ganger, G.6
-
48
-
-
0023401916
-
An approach to containing computer viruses
-
Aug.
-
M. Pozzo and T. Gray, "An Approach to Containing Computer Viruses," Computers and Security, vol. 6, no. 4, pp. 321-331, Aug. 1987.
-
(1987)
Computers and Security
, vol.6
, Issue.4
, pp. 321-331
-
-
Pozzo, M.1
Gray, T.2
-
49
-
-
0024664208
-
Defending systems against viruses through cryptographic authentication
-
May
-
G. Davida, Y. Desmedt, and B. Matt, "Defending Systems Against Viruses through Cryptographic Authentication," Proc. Symp. Security and Privacy, pp. 312-318, May 1989.
-
(1989)
Proc. Symp. Security and Privacy
, pp. 312-318
-
-
Davida, G.1
Desmedt, Y.2
Matt, B.3
-
51
-
-
85077749236
-
Analyzing integrity protection in the SELinux example policy
-
Aug.
-
T. Jaeger, R. Sailer, and X. Zhang, "Analyzing Integrity Protection in the SELinux Example Policy," Proc. 12th USENIX Security Symp., pp. 59-74, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
, pp. 59-74
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
52
-
-
85084161648
-
Confining root programs with domain and type enforcement (DTE)
-
July
-
K.M. Walker, D.F. Sterne, M.L. Badger, M.J. Petkac, D.L. Sherman, and K.A. Oostendorp, "Confining Root Programs with Domain and Type Enforcement (DTE)," Proc. Sixth USENIX Security Symp., July 1996.
-
(1996)
Proc. Sixth USENIX Security Symp.
-
-
Walker, K.M.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Sherman, D.L.5
Oostendorp, K.A.6
-
53
-
-
84946224955
-
-
Technical Report CSC-EPL-92-001, Nat'l Computer Security Center, Apr.
-
"Trusted XENIX Version 3.0 Final Evaluation Report," Technical Report CSC-EPL-92-001, Nat'l Computer Security Center, Apr. 1992.
-
(1992)
Trusted XENIX Version 3.0 Final Evaluation Report
-
-
-
55
-
-
78650020201
-
-
O'Reilly Media, Inc.
-
C. Tyler, Fedora Linux. O'Reilly Media, Inc., 2007.
-
(2007)
Fedora Linux
-
-
Tyler, C.1
-
56
-
-
7444222166
-
Digital rights management for content distribution
-
Q. Liu, R. Safavi-Naini, and N.P. Sheppard, "Digital Rights Management for Content Distribution," Proc. Australasian Information Security Workshop Conf. Frontiers, vol. 21, pp. 49-58, 2003.
-
(2003)
Proc. Australasian Information Security Workshop Conf. Frontiers
, vol.21
, pp. 49-58
-
-
Liu, Q.1
Safavi-Naini, R.2
Sheppard, N.P.3
-
59
-
-
0141528667
-
A logical reconstruction of SPKI
-
J.Y. Halpern and R. van der Meyden, "A Logical Reconstruction of SPKI," J. Computer Security, vol. 11, no. 4, pp. 581-613, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 581-613
-
-
Halpern, J.Y.1
Van Der Meyden, R.2
-
60
-
-
0032204757
-
Mobile code security
-
A.D. Rubin and D.E. Geer Jr., "Mobile Code Security," IEEE Internet Computing, vol. 2, no. 6, pp. 30-34, Nov. 1998. (Pubitemid 128558708)
-
(1998)
IEEE Internet Computing
, vol.2
, Issue.6
, pp. 30-34
-
-
Rubin, A.D.1
Geer Jr., D.E.2
-
61
-
-
36849044142
-
Secure software installation in a mobile environment
-
DOI 10.1145/1280680.1280705, SOUPS 2007: Proceedings of the Third Symposium On Usable Privacy and Security
-
A.P. Heiner and N. Asokan, "Secure Software Installation in a Mobile Environment," Proc. Poster, Third Symp. Usable Privacy and Security, pp. 155-156, 2007. (Pubitemid 350229392)
-
(2007)
ACM International Conference Proceeding Series
, vol.229
, pp. 155-156
-
-
Heiner, A.P.1
Asokan, N.2
|